Diego Kreutz
Cited by
Cited by
Software-defined networking: A comprehensive survey
D Kreutz, FMV Ramos, PE Verissimo, CE Rothenberg, S Azodolmolky, ...
Proceedings of the IEEE 103 (1), 14-76, 2014
Towards secure and dependable software-defined networks
D Kreutz, FMV Ramos, P Verissimo
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
On the feasibility of a consistent and fault-tolerant data store for SDNs
FA Botelho, FMV Ramos, D Kreutz, AN Bessani
2013 Second european workshop on software defined networks, 38-43, 2013
Software-defined networks: On the road to the softwarization of networking
FMV Ramos, D Kreutz, P Verissimo
Cutter IT journal, 2015
ANCHOR: Logically centralized security for software-defined networks
D Kreutz, J Yu, FMV Ramos, P Esteves-Verissimo
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-36, 2019
A cyber-resilient architecture for critical security services
D Kreutz, O Malichevskyy, E Feitosa, H Cunha, R da Rosa Righi, ...
Journal of Network and Computer Applications 63, 173-189, 2016
Towards secure and dependable authentication and authorization infrastructures
D Kreutz, A Bessani, E Feitosa, H Cunha
2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing …, 2014
Vazamentos de Dados: Histórico, Impacto Socioeconômico e as Novas Leis de Proteção de Dados
R Machado, D Kreutz, G Paz, G Rodrigues
Anais da XVII Escola Regional de Redes de Computadores, 154-159, 2019
The KISS principle in Software-Defined Networking: a framework for secure communications
D Kreutz, J Yu, P Esteves-Verissimo, C Magalhaes, FMV Ramos
IEEE Security & Privacy 16 (5), 60-70, 2018
System design artifacts for resilient identification and authentication infrastructures
D Kreutz, O Malichevskyy, E Feitosa, KRS Barbosa, H Cunha
parameters 11, 12, 2014
Experiences with fault-injection in a Byzantine fault-tolerant protocol
R Martins, R Gandhi, P Narasimhan, S Pertet, A Casimiro, D Kreutz, ...
Acm/ifip/usenix international conference on distributed systems platforms …, 2013
Increasing the resilience and trustworthiness of openid identity providers for future networks and services
D Kreutz, E Feitosa, H Cunha, H Niedermayer, H Kinkelin
2014 Ninth International Conference on Availability, Reliability and …, 2014
Trustworthy and resilient monitoring system for cloud infrastructures
S Padhy, D Kreutz, A Casimiro, M Pasin
Proceedings of the Workshop on Posters and Demos Track, 1-2, 2011
Sec-mon: An architecture for monitoring and controlling security service level agreements
RR Righi, DL Kreutz, CB Westphall
XI Workshop on Managing and Operating Networks and Services, 73-84, 2006
Towards cloud-based asynchronous elasticity for iterative HPC applications
R da Rosa Righi, VF Rodrigues, CA da Costa, D Kreutz, HU Heiss
Journal of Physics: Conference Series 649 (1), 012006, 2015
Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities.
D Kreutz, E Feitosa, MPM Ganzha, L Maciaszek
FedCSIS (Position Papers), 101-108, 2014
Architecture components for resilient networks
D Kreutz, H Niedermayer, E Feitosa, J da Silva Fraga, O Malichevskyy
SecFuNet. eu, Tech. Rep, 2013
The KISS principle in software-defined networking: An architecture for keeping it simple and secure
D Kreutz, J Yu, P Esteves-Verissimo, C Magalhães, F Ramos
arXiv preprint arXiv:1702.04294, 2017
Trone: Trustworthy and resilient operations in a network environment
A Casimiro, P Verissimo, D Kreutz, F Araujo, R Barbosa, S Neves, ...
IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012
FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol.
JOM Chervinski, D Kreutz, J Yu
IACR Cryptol. ePrint Arch. 2019, 455, 2019
The system can't perform the operation now. Try again later.
Articles 1–20